"There are more instance of the abridgment of the freedom of the people by gradual and silent encroachments of those in power than by violent and sudden usurpations." -- James Madison, 1788

My first day in college, the professor for Public Policy 101 asked a 200-person class, "If there were a policy that saved over 20,000 lives, reduced carbon emissions by 20 percent, reduced gasoline usage by 20 percent, decreased average insurance costs by 75 percent, and which would increase revenues to the federal government and not cost any additional money to implement -- who in this room would support this policy?" Of course, everyone's hands went up.

The policy solution that he was referring to, he soon revealed, was to cap national speed limits at 40 miles per hour. The room, filled mainly with 18-to-20-year-olds, was horrified at the prospect of never being able to drive their car above 40 mph on the highway. Individual freedom is difficult to quantify in public-policy analysis until its real costs are clear, but it has to be part of the conversation.

The government's policies in the NSA's PRISM program reflect perhaps the perfect storm of public-policy conundrums. This surveillance seems to offer short-term advantages, with the real costs hidden, diffuse, unknown, and, seemingly, far in the future. What, many ask, is the real price of giving up privacy? The government has presented PRISM, and other similar surveillance programs, as a solution to a danger and fear -- terrorism -- which is almost impossible to comprehend: Terrorism is everywhere and nowhere; the battlefield is across the globe; the threat is omnipresent. It is difficult for the average person to perceive and understand until it is splashed across television screens. Terrorism is by definition designed to "shock and awe." It is theatre of the macabre.

The government has used this fear to justify unprecedented intrusions into our privacy, including monitoring who we call, our location data, and allegedly even the contents of our communication (if there is a 51 percent chance that one party to the communication is foreign). Our personal calling data, emails, letters, credit-card transaction data -- everything seems fair game. The fact that the NSA wants this much information shouldn't be surprising. The old maxim that to a hammer every problem looks like a nail is appropriate here. A spy agency specializing in "signals" intelligence is always looking for more phone calls, emails, and other signals-based data to analyze. The more data NSA receives, the more powerful it becomes.

The most worrying facet of this story is the willingness of some Americans and members of Congress to so quickly disregard the Fourth Amendment and our liberty in the name of terrorism. Not so long ago, the U.S. faced arguably higher stakes, and more significant dangers, but made the opposite choices -- choices more consistent with our founding principles.

Throughout the Cold War there was a real threat of apocalyptic proportions. The Soviet Union assembled and deployed more than 45,000 nuclear warheads, enough destructive power to annihilate the United States and end humanity as we know it. The U.S. government did plenty of reprehensible things during the Cold War, including trying to assassinate elected leaders, subverting democracies, and wiretapping political rivals and "subversives" such as Martin Luther King Jr. As a result of these scandals, along with Watergate, the American people responded and demanded accountability through the Church and Pike Committees of the 1970s in the House and Senate.* Will they do the same today?

The most worrying facet of the PRISM story is the willingness of some Americans and members of Congress to so quickly disregard the Fourth Amendment in the name of terrorism.

If the justification for PRISM and associated programs is predicated on their potential effectiveness, why shouldn't such logic be applied elsewhere? Here are several other even more effective public-policy solutions that also violate the Fourth Amendment in similar ways and are just as reprehensible. There is some dispute over whether PRISM and other reported programs are legal or Constitutional. I believe, and have argued, that third-party records should be protected under the Fourth Amendment, so that access to these records requires a warrant. This is not the perspective the courts have taken. But if we are going to use personal data obtained through PRISM for terrorism purposes in a way that violates our privacy and which I would argue violates the Fourth Amendment, why not do it for other legitimate purposes?

1. Child Pornography: Whenever the FBI receives a computer for a routine search, it searches the computer for known "hashes" of video and picture files of child pornography. This allows it to quickly and easily search every computer brought in, time permitting, for known child pornography. Of course the FBI receives many computers through warrants, but this is still a small percentage of all computers.

Since the NSA seems to have access to a substantial amount of web traffic, what if it used spare capacity for "deep packet inspection" technology to identify known child-pornography pictures and videos? Software would only flag the transfer if there were a 100 percent certainty of it being the exact same file. (Since this is a hypothetical, let's assume the technology exists and can be implemented.) Laws against child pornography are partially designed to dry up the market for child exploitation. This policy could greatly reduce child pornography, catch potential pedophiles, and reduce existing child exploitation. From a legal perspective, the courts have found that individuals have no reasonable expectation of privacy for contraband; therefore, if such a search only finds contraband then it may be on more solid legal territory. Should the government be able to use technologies like PRISM and related exposed programs to find child pornography?

2. Speed Limits: Many accidents are related to reckless driving, and speeding can make them significantly more dangerous and deadly. What if instead of enforcing speed limits by stationing police officers to patrol our streets, a relatively ineffective and costly method of enforcement, the government instead monitored the speed of all cars in real time using cellphones. If NSA data on phone location were analyzed in real time, it could potentially determine the speed of any user. All phones traveling below 20 mph would be excluded on the assumption that they're not driving. All phones traveling faster than 20 mph would be plotted to discern what road they are traveling on and what the speed limit is for that road.

The government could then identify drivers who were speeding and send them tickets in the mail, text them to slow down (then ticket them for opening it while driving!), or dispatch an officer to catch them. Further data analysis could identify potential drunk driving for police investigation, based upon erratic driving patterns or when phones were at known bars for several hours before being in a vehicle. Such policies could potentially save tens of thousands of lives and increase revenues from speeding fines while reducing the costs of patrolling the road. Should the government be able to use technologies like PRISM and related exposed programs to make our roads safer?

3. Illegal Downloading: Millions of Americans have used BitTorrent or other technologies to illegally download music, movies, TV shows, and software. While torrents can be used to download non-copyrighted and copyrighted digital goods, a substantial amount (one study found 89 percent) of the traffic appears to be used for illegal downloading. NSA PRISM level surveillance could be of use in identifying which users are using BitTorrent, then identifying the users who have uploaded or downloaded the most, and identifying whether their downloads involved illegal content. (Again, let's assume the technology is available.) This information could be forwarded to the Department of Justice for prosecution (or more crafty lobbyists could get the information forwarded to a private entity like the RIAA or MPAA for lawsuits). Should the government be able to use technologies like PRISM and related exposed programs to protect copyright holders?

****

If the barometer for violating the Fourth Amendment is efficacy, then why should these not also be up for discussion? The answer is clear: The Fourth Amendment was not designed for efficacy. It was designed for privacy and to defend our liberty. If that's not the case, why even stop with these examples? Most of our phones have cameras and microphones that, at least in some circumstances, can be turned on remotely that would surely provide invaluable information for intelligence and law enforcement (the FBI has used this for organized crime prosecution, remotely turning on the microphone of phones to record non phone-call conversations).

Information given to the government for the NSA may be made available to other agencies such as the IRS, why wouldn't it be? We already know that it has been shared with foreign agencies (e.g., Dutch intelligence, German intelligence, and British intelligence). Even if a court were to find that PRISM data violates the Fourth Amendment, courts have traditionally held that even information that was illegally obtained can be used in court to impeach testimony -- in other words, it could plausibly be admissible to catch a tax cheat.

If elected leaders were angels there would be less need for protection of our privacy. But they are not angels.

And as many of us in the technology world know, once something exists in data form it is often retained forever. In an era where data storage is cheap and getting cheaper, American citizens' information will likely be retained indefinitely (the NSA is building that capacity in a Utah facility). At some point this massive repository of information may be hacked, at some point could be available to political appointees looking for partisan gain, or it may be used for "security" reasons against "troublemakers" trying to change our society -- social change often comes through those who are perceived to be dangerous to the state.

As James Madison argued in Federalist 51, "If men were angels, no government would be necessary. If angels were to govern men, neither external nor internal controls on government would be necessary." But men are not angels and we have experience with elected leaders that are partisan, opportunist, short-sighted and, sometimes, even corrupt. Government's natural inclination is to abuse its power, one critical reason why our Founders limited it.

The danger of a surveillance state is not the obscure chance of a truly evil person abusing the system; rather, the actual threat, the real danger, is a person with good intentions who believes that their draconian actions are morally justified and prudent. It is such a leader, perhaps with the best of intentions, who can make the most heinous of mistakes with eyes wide open and belief that the ends justify the means. Those ends never justify eviscerating the Fourth Amendment.

* This is not to say that the Church and Pike Committees completely dealt with abuses -- they did not -- but they were a clear step in the right direction and demanding accountability and limits to government abuse.

About the Author

Derek Khanna is a Yale Law Visiting Fellow at the Information Society Project. He was previously a congressional staffer for the House Republican Study Committee and Senator Scott Brown (R-MA). He writes about issues at the intersection of government and technology.

Most Popular

Writing used to be a solitary profession. How did it become so interminably social?

Whether we’re behind the podium or awaiting our turn, numbing our bottoms on the chill of metal foldout chairs or trying to work some life into our terror-stricken tongues, we introverts feel the pain of the public performance. This is because there are requirements to being a writer. Other than being a writer, I mean. Firstly, there’s the need to become part of the writing “community”, which compels every writer who craves self respect and success to attend community events, help to organize them, buzz over them, and—despite blitzed nerves and staggering bowels—present and perform at them. We get through it. We bully ourselves into it. We dose ourselves with beta blockers. We drink. We become our own worst enemies for a night of validation and participation.

Even when a dentist kills an adored lion, and everyone is furious, there’s loftier righteousness to be had.

Now is the point in the story of Cecil the lion—amid non-stop news coverage and passionate social-media advocacy—when people get tired of hearing about Cecil the lion. Even if they hesitate to say it.

But Cecil fatigue is only going to get worse. On Friday morning, Zimbabwe’s environment minister, Oppah Muchinguri, called for the extradition of the man who killed him, the Minnesota dentist Walter Palmer. Muchinguri would like Palmer to be “held accountable for his illegal action”—paying a reported $50,000 to kill Cecil with an arrow after luring him away from protected land. And she’s far from alone in demanding accountability. This week, the Internet has served as a bastion of judgment and vigilante justice—just like usual, except that this was a perfect storm directed at a single person. It might be called an outrage singularity.

Forget credit hours—in a quest to cut costs, universities are simply asking students to prove their mastery of a subject.

MANCHESTER, Mich.—Had Daniella Kippnick followed in the footsteps of the hundreds of millions of students who have earned university degrees in the past millennium, she might be slumping in a lecture hall somewhere while a professor droned. But Kippnick has no course lectures. She has no courses to attend at all. No classroom, no college quad, no grades. Her university has no deadlines or tenure-track professors.

Instead, Kippnick makes her way through different subject matters on the way to a bachelor’s in accounting. When she feels she’s mastered a certain subject, she takes a test at home, where a proctor watches her from afar by monitoring her computer and watching her over a video feed. If she proves she’s competent—by getting the equivalent of a B—she passes and moves on to the next subject.

There’s no way this man could be president, right? Just look at him: rumpled and scowling, bald pate topped by an entropic nimbus of white hair. Just listen to him: ranting, in his gravelly Brooklyn accent, about socialism. Socialism!

And yet here we are: In the biggest surprise of the race for the Democratic presidential nomination, this thoroughly implausible man, Bernie Sanders, is a sensation.

He is drawing enormous crowds—11,000 in Phoenix, 8,000 in Dallas, 2,500 in Council Bluffs, Iowa—the largest turnout of any candidate from any party in the first-to-vote primary state. He has raised $15 million in mostly small donations, to Hillary Clinton’s $45 million—and unlike her, he did it without holding a single fundraiser. Shocking the political establishment, it is Sanders—not Martin O’Malley, the fresh-faced former two-term governor of Maryland; not Joe Biden, the sitting vice president—to whom discontented Democratic voters looking for an alternative to Clinton have turned.

The new version of Apple’s signature media software is a mess. What are people with large MP3 libraries to do?

When the developer Erik Kemp designed the first metadata system for MP3s in 1996, he provided only three options for attaching text to the music. Every audio file could be labeled with only an artist, song name, and album title.

Kemp’s system has since been augmented and improved upon, but never replaced. Which makes sense: Like the web itself, his schema was shipped, good enough,and an improvement on the vacuum which preceded it. Those three big tags, as they’re called, work well with pop and rock written between 1960 and 1995. This didn’t prevent rampant mislabeling in the early days of the web, though, as anyone who remembers Napster can tell you. His system stumbles even more, though, when it needs to capture hip hop’s tradition of guest MCs or jazz’s vibrant culture of studio musicianship.

Some say the so-called sharing economy has gotten away from its central premise—sharing.

This past March, in an up-and-coming neighborhood of Portland, Maine, a group of residents rented a warehouse and opened a tool-lending library. The idea was to give locals access to everyday but expensive garage, kitchen, and landscaping tools—such as chainsaws, lawnmowers, wheelbarrows, a giant cider press, and soap molds—to save unnecessary expense as well as clutter in closets and tool sheds.

The residents had been inspired by similar tool-lending libraries across the country—in Columbus, Ohio; in Seattle, Washington; in Portland, Oregon. The ethos made sense to the Mainers. “We all have day jobs working to make a more sustainable world,” says Hazel Onsrud, one of the Maine Tool Library’s founders, who works in renewable energy. “I do not want to buy all of that stuff.”

During the multi-country press tour for Mission Impossible: Rogue Nation, not even Jon Stewart has dared ask Tom Cruise about Scientology.

During the media blitz for Mission Impossible: Rogue Nation over the past two weeks, Tom Cruise has seemingly been everywhere. In London, he participated in a live interview at the British Film Institute with the presenter Alex Zane, the movie’s director, Christopher McQuarrie, and a handful of his fellow cast members. In New York, he faced off with Jimmy Fallon in a lip-sync battle on The Tonight Show and attended the Monday night premiere in Times Square. And, on Tuesday afternoon, the actor recorded an appearance on The Daily Show With Jon Stewart, where he discussed his exercise regimen, the importance of a healthy diet, and how he still has all his own hair at 53.

Stewart, who during his career has won two Peabody Awards for public service and the Orwell Award for “distinguished contribution to honesty and clarity in public language,” represented the most challenging interviewer Cruise has faced on the tour, during a challenging year for the actor. In April, HBO broadcast Alex Gibney’s documentary Going Clear, a film based on the book of the same title by Lawrence Wright exploring the Church of Scientology, of which Cruise is a high-profile member. The movie alleges, among other things, that the actor personally profited from slave labor (church members who were paid 40 cents an hour to outfit the star’s airplane hangar and motorcycle), and that his former girlfriend, the actress Nazanin Boniadi, was punished by the Church by being forced to do menial work after telling a friend about her relationship troubles with Cruise. For Cruise “not to address the allegations of abuse,” Gibney said in January, “seems to me palpably irresponsible.” But in The Daily Show interview, as with all of Cruise’s other appearances, Scientology wasn’t mentioned.

A leading neuroscientist who has spent decades studying creativity shares her research on where genius comes from, whether it is dependent on high IQ—and why it is so often accompanied by mental illness.

As a psychiatrist and neuroscientist who studies creativity, I’ve had the pleasure of working with many gifted and high-profile subjects over the years, but Kurt Vonnegut—dear, funny, eccentric, lovable, tormented Kurt Vonnegut—will always be one of my favorites. Kurt was a faculty member at the Iowa Writers’ Workshop in the 1960s, and participated in the first big study I did as a member of the university’s psychiatry department. I was examining the anecdotal link between creativity and mental illness, and Kurt was an excellent case study.

He was intermittently depressed, but that was only the beginning. His mother had suffered from depression and committed suicide on Mother’s Day, when Kurt was 21 and home on military leave during World War II. His son, Mark, was originally diagnosed with schizophrenia but may actually have bipolar disorder. (Mark, who is a practicing physician, recounts his experiences in two books, The Eden Express and Just Like Someone Without Mental Illness Only More So, in which he reveals that many family members struggled with psychiatric problems. “My mother, my cousins, and my sisters weren’t doing so great,” he writes. “We had eating disorders, co-dependency, outstanding warrants, drug and alcohol problems, dating and employment problems, and other ‘issues.’ ”)

The Islamic State is no mere collection of psychopaths. It is a religious group with carefully considered beliefs, among them that it is a key agent of the coming apocalypse. Here’s what that means for its strategy—and for how to stop it.

What is the Islamic State?

Where did it come from, and what are its intentions? The simplicity of these questions can be deceiving, and few Western leaders seem to know the answers. In December, The New York Times published confidential comments by Major General Michael K. Nagata, the Special Operations commander for the United States in the Middle East, admitting that he had hardly begun figuring out the Islamic State’s appeal. “We have not defeated the idea,” he said. “We do not even understand the idea.” In the past year, President Obama has referred to the Islamic State, variously, as “not Islamic” and as al-Qaeda’s “jayvee team,” statements that reflected confusion about the group, and may have contributed to significant strategic errors.

An attack on an American-funded military group epitomizes the Obama Administration’s logistical and strategic failures in the war-torn country.

Last week, the U.S. finally received some good news in Syria:.After months of prevarication, Turkey announced that the American military could launch airstrikes against Islamic State positions in Syria from its base in Incirlik. The development signaled that Turkey, a regional power, had at last agreed to join the fight against ISIS.

The announcement provided a dose of optimism in a conflict that has, in the last four years, killed over 200,000 and displaced millions more. Days later, however, the positive momentum screeched to a halt. Earlier this week, fighters from the al-Nusra Front, an Islamist group aligned with al-Qaeda, reportedly captured the commander of Division 30, a Syrian militia that receives U.S. funding and logistical support, in the countryside north of Aleppo. On Friday, the offensive escalated: Al-Nusra fighters attacked Division 30 headquarters, killing five and capturing others. According to Agence France Presse, the purpose of the attack was to obtain sophisticated weapons provided by the Americans.